Categories
Havocsec
Cybersecurity blog featuring penetration testing guides, vulnerability research, CTF writeups, and offensive security tutorials
Brainfuck/Text/Ook! Obfuscator-Deobfuscator
AI-powered security and productivity tool
Chat
Claude
Claude Code Templates - Supercharge Your AI-Powered Development with Anthropic's Claude Code
Professional templates for Anthropic's Claude Code. Deep coding at terminal velocity with Claude Opus 4.1. Install 100+ agents, commands, settings & hooks. Transform your AI-powered development workflow.
CrackStation - Online Password Hash Cracking - MD5, SHA1, Linux, Rainbow Tables, etc.
Crackstation is the most effective hash cracking service. We crack: MD5, SHA1, SHA2, WPA, and much more...
DorkGPT - Generate Google Dorks with AI
DorkGPT is an AI-powered tool that generates Google dorks to help you find specific information online. Type in your query and let the AI create effective dorks for your search needs.
GamsGo&ChatGPT - GamsGo
Try GPT-4.1, Gemini Pro, and Claude AI chatbots for free on Rita. No sign-up needed—get smart, instant answers from the world’s top AI models in one place.
is-a.dev - Free subdomains for developers
AI-powered security and productivity tool
Lumina: AI Transparency & Trust
AI-powered security and productivity tool
Maintaining Privacy and Security Online
AI-powered security and productivity tool
Squatm3gator - a complete web solution based on the python tool squatm3, designed to enumerate available domains generated modifying the original domain name through different cybersquatting techniques
Open source code repository and collaboration platform
Webhook.site - Test, process and transform emails and HTTP requests
Instantly generate a free, unique URL and email address to test, inspect, and automate (with a visual workflow editor and scripts) incoming HTTP requests and emails
Andwati
Personal blog covering hobby projects, offensive security, and reverse engineering experiences by 0xmockingspectre
Blog
Threat intelligence and vulnerability research from Cisco Talos, covering malware analysis and security trends
Blog | bravosec (AKA opabravo)
Security research, tutorials, and technical articles
Checklist - Linux Privilege Escalation - HackTricks
This URL is invalid, sorry. Please use the navigation bar or search to continue.
Checklist - Local Windows Privilege Escalation - HackTricks
This URL is invalid, sorry. Please use the navigation bar or search to continue.
CTF Handbook
Capture the Flag Competition Wiki
CX330 - Hack the planet!
Security research, tutorials, and technical articles
Cybersecurity – The Latina Tech
Posts about Cybersecurity written by The Latina Tech
CyberSpace Gitbook - CyberSpace
Cybersecurity articles, research, and technical write-ups
DFIR.blog
Digital forensics and incident response blog with technical articles and research
Google Project Zero
Google's team researching zero-day vulnerabilities and publishing detailed security research
HackerOne Hacktivity
Bug bounty platform connecting companies with security researchers
Hacking Blog - hacking and computer security
Security research, tutorials, and technical articles
Hackingarticles
Comprehensive penetration testing tutorials, CTF walkthroughs, and practical hacking guides
HackTricks - HackTricks
Reading time: 8 minutes
HackTricks: pentesting-web
This URL is invalid, sorry. Please use the navigation bar or search to continue.
Hao Jiang
Cybersecurity articles, research, and technical write-ups
InfoSec Write-ups
Detailed solutions and explanations for security challenges
Kali Forums
Debian-based Linux distribution for penetration testing and security auditing
Krebs on Security
In-depth security news and investigation, covering data breaches, cybercrime, and online fraud
Krebsonsecurity
In-depth security news and investigation, covering data breaches, cybercrime, and online fraud
LetsDefend Blog
Blue team security operations and defensive security blog with practical guides
Martian Defense Notebook | Martian Defense NoteBook
Cybersecurity articles, research, and technical write-ups
PortSwigger Research
Cutting-edge web security research from the creators of Burp Suite, featuring novel attack techniques
Recon Everything. Bug Bounty Hunting Tip #1- Always read… | by SACHIN GROVER | InfoSec Write-ups
Detailed solutions and explanations for security challenges
Schneier on Security
The Department of Justice has indicted thirty-one people over the high-tech rigging of high-stakes poker games.
The DFIR Report
Real-world intrusion reports and malware analysis from incident response cases
Thehackernews
Latest cybersecurity news, data breaches, vulnerabilities, and hacking incidents
Threatpost
Threatpost, is an independent news site which is a leading source of information about IT and business security for hundreds of thousands of professionals worldwide.
Troy Hunt Blog
Unit42
Cybersecurity threat intelligence and research from Palo Alto Networks Unit 42 team
Upgrading Simple Shells to Fully Interactive TTYs - ropnop blog
Security research, tutorials, and technical articles
Vickie Li's Security Blog
Security research, tutorials, and technical articles
Bug Bounty Program - Complete List | HackerOne
Bug bounty platform connecting companies with security researchers
BugBounty.jp - バグバウンティ・プラットフォーム
Bug bounty program and vulnerability disclosure platform
Bugcrowd
Crowdsourced cybersecurity platform for vulnerability disclosure and bug bounties
Bugcrowd - Crowdsourced Cybersecurity Platform
Crowdsourced cybersecurity platform for vulnerability disclosure and bug bounties
FireBounty - The Ultimate Vulnerability Disclosure Policy and Bug Bounty List!
Bug bounty program and vulnerability disclosure platform
HackenProof - Web3 Bug Bounty platform for Crypto Projects
Bug bounty program and vulnerability disclosure platform
Hacker Mediation | HackerOne Platform Documentation
Hackers: When and how to request mediation from HackerOne
Hackerone
HackerOne | #1 Trusted Security Platform and Hacker Program
Bug bounty platform connecting companies with security researchers
HackerOne Code of Conduct | Hacker101
Hacker101 is a free class for web security. Whether you’re a programmer with an interest in bug bounties or a seasoned security professional, Hacker101 has something to teach you.
HackerOne Directory: Report Vulnerabilities to Companies' Security Teams
Bug bounty platform connecting companies with security researchers
Intigriti
Intigriti is a global bug bounty platform, helping enterprises secure systems with ethical hackers, VDPs, and penetration testing.
Intigriti - Bug Bounty & Agile Pentesting Platform
Intigriti is a global bug bounty platform, helping enterprises secure systems with ethical hackers, VDPs, and penetration testing.
Invitations | HackerOne Platform Documentation
Hackers: Learn how invitations work on the HackerOne platform
Open Bug Bounty - Free Bug Bounty Program and Coordinated Vulnerability Disclosure
Bug bounty program and vulnerability disclosure platform
RedStorm - Bug Bounty
Bug bounty program and vulnerability disclosure platform
Safehats - Bug Bounty Program | Vulnerability Disclosure
Bug bounty program and vulnerability disclosure platform
Submitting Reports | HackerOne Platform Documentation
Hackers: How to submit reports on the HackerOne platform
Synack - Premier Security Testing Platform
Bug bounty program and vulnerability disclosure platform
YesWeHack - Global Bug Bounty platform & VDP platform
Bug bounty platform connecting security researchers with organizations
Yogosha - VOC / Vulnerability Operations Center
Bug bounty program and vulnerability disclosure platform
Cipher Identifier
Stuck with a cipher or secret code? This free AI tool will help you identify the type of encryption and guide you how to decode and solve it.
Ciphey
Automated decryption tool using AI and natural language processing
Crackstation
Crackstation is the most effective hash cracking service. We crack: MD5, SHA1, SHA2, WPA, and much more...
DeHashed — #FreeThePassword
Have you been compromised? DeHashed provides free deep-web scans and protection against credential leaks. A modern personal asset search engine created for security analysts, journalists, security companies, and everyday people to help secure accounts and provide insight on compromised assets. Free breach alerts & breach notifications.
example_hashes [hashcat wiki]
Cryptographic tools and encryption resources
Gchq
Web app for encryption, encoding, compression and data analysis - the Cyber Swiss Army Knife
Generate All Hashes - MD5, SHA1, SHA3, CRC32 - Online - Browserling Web Developer Tools
Useful, free online tool that computes all possible hashes of strings and text. No ads, nonsense, or garbage, just all hashes. Press a button – get the result.
Hash Encoders Online
Online tools offer many functions for hashing, encoding, decoding, encryption, decryption, formatting, generating and so on. Examples include MD5, SHA-256, SHA-512, SHA-3, Keccak, Base64, Base32, JSON, XML, and QR code related tools.
Hash Encryption and Reverse Decryption
Cryptographic tools and encryption resources
Hash Type Identifier - Check and validate your hash string
Cryptographic tools and encryption resources
Hashcat
Hashes - Decrypt MD5, SHA1, MySQL, NTLM, SHA256, SHA512, Wordpress, Bcrypt hashes for free online
Decrypt and crack your MD5, SHA1, SHA256, MySQL, MD5 Email, SHA256 Email, and NTLM hashes for free online. We also support Bcrypt, SHA512, Wordpress and many more.
Hashkiller.io
Cryptographic tools and encryption resources
John the Ripper
A fast password cracker for Unix, macOS, Windows, DOS, BeOS, and OpenVMS
John The Ripper Hash Formats | pentestmonkey
Cryptographic tools and encryption resources
mask_attack [hashcat wiki]
Cryptographic tools and encryption resources
rejection_rule_based_attack [hashcat wiki]
Cryptographic tools and encryption resources
rot13.com
Cryptographic tools and encryption resources
rule_based_attack [hashcat wiki]
Cryptographic tools and encryption resources
URL Decoder/Encoder
Cryptographic tools and encryption resources
URL-encoding Reference
Cryptographic tools and encryption resources
Vigenère Cipher Online
Method of encrypting alphabetic text by using a series of interwoven Caesar ciphers based on the letters of a keyword. Though the 'chiffre indéchiffrable' is easy to understand and implement, for three centuries it resisted all attempts to break it.
XOR Calculator Online
Calculate the exclusive or (XOR) with a simple web-based calculator. Input and output in binary, decimal, hexadecimal or ASCII.
0xdf hacks stuff | CTF solutions, malware analysis, home lab development
CTF solutions, malware analysis, home lab development
About pwntools — pwntools 5.0.0dev documentation
Capture The Flag challenges and cybersecurity competitions
beafb1b1/challenges: CTF&RealWorld challenges
Open source code repository and collaboration platform
BlackHat MEA Qualification CTF 2025
Flagyard is an online platform that offers hands-on cybersecurity training, including various types of capture-the-flag challenges to develop players’ hacking skills in a gamified environment that is both practical and accessible anytime and anywhere.
Capture The Flag Cheatsheet - SaiKiran Uppu
Awesome Capture the Flag Cheatsheet
Challenges - ImaginaryCTF
Capture The Flag challenges and cybersecurity competitions
CryptoHack
Interactive cryptography challenges and courses to learn modern cryptography
CTFROOM
Capture The Flag challenges and cybersecurity competitions
CTFtime
CTFtime.org - Calendar
Capture The Flag, CTF teams, CTF ratings, CTF archive, CTF writeups
CyberDefenders
Blue team training platform for SOC analysts, threat hunters, DFIR, and security blue teams to advance CyberDefense skills.
Cybersecurity Conferences [Updated Daily]
Discover expert insights on cybersecurity trends and best practices. Stay ahead with our comprehensive guides and analysis.
DefCamp Capture the Flag 2025
Explore 100+ cybersecurity challenges! Free signup. CTFs include web security, reverse engineering, network & traffic analysis, binary exploitation & more.
GitHub - swisskyrepo/PayloadsAllTheThings: A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Open source code repository and collaboration platform
Hack The Box: Hacking Training For The Best | Individuals & Companies
Interactive penetration testing labs and cybersecurity training platform
Hackthebox
Online platform for practicing penetration testing skills through realistic vulnerable machines
HackTheBox
Online platform for practicing penetration testing skills through realistic vulnerable machines
Have I Been Pwned: Check if your email has been compromised in a data breach
Have I Been Pwned allows you to check whether your email address has been exposed in a data breach.
OffSec
Build cyber workforce resilience with our unmatched skills development and hands-on learning platform and library.
OverTheWire
War games for learning security concepts through command-line challenges and puzzles
Picoctf
PicoCTF
Free computer security competition with challenges for all skill levels
PWNX
Combine real-world threat simulations with advanced digital twin technology to secure your most critical operations. Our platform merges the latest cybersecurity insights with immersive, hands-on scenarios, ensuring your team is equipped to anticipate and neutralize evolving threats protecting your organization’s future in an ever-changing digital landscape.A virtual training ground for cybersecurity can help an organization
Root Me
Platform to practice CTF challenges across various security topics
Tryhackme
Gamified cybersecurity training platform with guided learning paths and hands-on labs
TryHackMe
Gamified cybersecurity training platform with guided learning paths and hands-on labs
TryHackMe | Cyber Security Training
Gamified cybersecurity training platform with guided learning paths and hands-on labs
Awesome Blue Team
Resources for defensive security and blue team operations
Awesome Cyber Security
Curated list of awesome cybersecurity resources, tools, and frameworks
Awesome Cyber Security (okhosting)
Another curated awesome list of cybersecurity resources
Awesome Cyber Skills
Curated list of resources for developing cybersecurity skills
Awesome Cybersec
Comprehensive cybersecurity resources and learning materials
Awesome Hacking
Collection of hacking tools, tutorials, and resources
Awesome InfoSec
Information security resources and learning materials
Awesome Pentest
Collection of penetration testing resources, tools, and learning materials
Awesome Pentest Cheatsheets
Collection of penetration testing cheat sheets and quick references
Awesome Security
Collection of awesome software, libraries, and resources about security
Awesome Security (mbcrump)
A collection of awesome ethical hacking and security related content! - mbcrump/awesome-security
Beginner Network Pentesting
Complete guide and resources for beginners in network penetration testing
codecrafters-io/build-your-own-x: Master programming by recreating your favorite technologies from scratch.
Open source code repository and collaboration platform
CX330Blake/ZYPE: ZYPE: Your Payload Encryptor. MSFvenom shellcode got detected? ZYPE encrypt and obfuscate the shellcode for you!
Open source code repository and collaboration platform
Cybersecurity Resources
Personal collection of cybersecurity resources and tools
dev-lu
Open source code repository and collaboration platform
GitHub - 411Hall/JAWS: JAWS - Just Another Windows (Enum) Script
Open source code repository and collaboration platform
GitHub - carlospolop/privilege-escalation-awesome-scripts-suite: PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
Open source code repository and collaboration platform
GitHub - GhostPack/Seatbelt: Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensive security perspectives.
Open source code repository and collaboration platform
GitHub - projectdiscovery/interactsh: An OOB interaction gathering server and client library
Open source code repository and collaboration platform
GitHub - rebootuser/LinEnum: Scripted Local Linux Enumeration & Privilege Escalation Checks
Open source code repository and collaboration platform
GitHub - sleventyeleven/linuxprivchecker: linuxprivchecker.py -- a Linux Privilege Escalation Check Script
Open source code repository and collaboration platform
h4t3p1ckl3s (h4t3p1ckl3s) / Repositories
Open source code repository and collaboration platform
Hacker Roadmap
Roadmap for aspiring penetration testers and security researchers
HackUnderway (Hack Underway)
Open source code repository and collaboration platform
Learn Website Hacking
Learn web application penetration testing from scratch with practical examples
mtarza13 (mtarza13) / Repositories
Open source code repository and collaboration platform
NIST Cybersecurity Resources
National Institute of Standards and Technology official cybersecurity learning resources
Nix Configuration
Open source code repository and collaboration platform
OpenVAS Reporting: Convert OpenVAS XML report files to reports
Open source code repository and collaboration platform
PayloadsAllTheThings/Bind Shell Cheatsheet.md at master · swisskyrepo/PayloadsAllTheThings · GitHub
Open source code repository and collaboration platform
Penetration Testing
Comprehensive penetration testing resources and methodologies
Penetration Testing Tools
Custom penetration testing tools and scripts collection
Personal Security Checklist
Comprehensive personal security and privacy checklist
Public Pentesting Reports
Collection of public penetration testing reports for learning and reference
SQLMap - Boundaries
Open source code repository and collaboration platform
SQLMap - Enumeration queries
Open source code repository and collaboration platform
SQLMap - Payloads
Open source code repository and collaboration platform
thenew-programer/DataStructures: Implementation of Data Structures concepts in C/C++ and Java.
Open source code repository and collaboration platform
Trendshift - Explore open-source repositories and find some insights
Open source cybersecurity tools and resources repository
Zie619/n8n-workflows: all of the workflows of n8n i could find (also from the site itself)
Open source code repository and collaboration platform
Flipper Zero - Portable Multi-tool Device for Geeks
Portable multi-tool for pentesters and hardware hackers
Flipperzero
HackRF One
Hak5 - Hacking Tools & Media
Hak5 — industry leading hacker tools & award winning hacking shows for red teams, pentesters, cyber security students and IT professionals. Creators of the WiFi Pineapple, USB Rubber Ducky & more. Home to an inclusive information security community. Established in 2005.
Maltronics - Pentesting Products
Gain a shell, extract files, anything is possible with MalDuino!
Proxmark3
USB Rubber Ducky
NEW VERSION OF THE BEST SELLING HOTPLUG With a few seconds of physical access, all bets are off...
WiFi Pineapple
The industry standard WiFi pentest platform has evolved. Equip your red team with the WiFi Pineapple® Mark VII. Newly refined. Enterprise ready.
aaencode - Encode any JavaScript program to Japanese style emoticons (^_^)
JavaScript security tools and resources
JavaScript Beautifier
JavaScript security tools and resources
JavaScript Minifier
Use our JavaScript Minifier & Compressor tool to reduce JavaScript code size and make your website load faster. Get started for free now.
Javascript Obfuscator - BeautifyTools.com
Obfuscate javascript code using Online Javascript Obfuscator to make your javascript code nearly impossible to read or understand.
JavaScript Obfuscator Tool
JavaScript Obfuscator is a free online tool that obfuscates your source code, preventing it from being stolen and used without permission.
jjencode - Encode any JavaScript program using only symbols
JavaScript security tools and resources
JSConsole
JavaScript security tools and resources
JSFiddle - Code Playground
JSFiddle - Test your JavaScript, CSS, HTML or CoffeeScript online with JSFiddle.
JSFuck - Write any JavaScript with 6 Characters: []()!+
JSFuck is an esoteric and educational programming style based on the atomic parts of JavaScript. It uses only six different characters to execute code.
Prettier v2.3.2
JavaScript security tools and resources
regex101: build, test, and debug regex
Regular expression tester with syntax highlighting, explanation, cheat sheet for PHP/PCRE, Python, GO, JavaScript, Java, C#/.NET, Rust.
Regulex:JavaScript Regular Expression Visualizer
JavaScript security tools and resources
Special Characters in HTML
Special Characters in HTML
Avatao
Interactive challenges to practice cybersecurity skills with hands-on exercises
Colab - Welcome To Colab
Hands-on cybersecurity training and practice environment
Crackmes.One
Reverse engineering challenges and crackmes to practice binary analysis skills
Exploit Exercises
Virtual machines and challenges designed to practice security exploits and vulnerabilities
GitHub - digininja/DVWA: Damn Vulnerable Web Application (DVWA)
Open source code repository and collaboration platform
GitHub - rapid7/metasploitable3: Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.
Open source code repository and collaboration platform
Hack Me
Community platform for building, hosting and sharing vulnerable web application code
Hack This Site
Free training ground for hackers with challenges and an active community forum
Hack This!!
Practice challenges covering cryptography, forensics, JavaScript, SQL, and more
Hacker Test
Challenges focusing on JavaScript, PHP, HTML and creative problem solving
Juice Shop - Insecure Web Application for Training | OWASP
Hands-on cybersecurity training and practice environment
LabEx Cybersecurity Labs
Interactive hands-on labs covering penetration testing, ethical hacking, network security, and digital forensics
Metasploitable 2 Exploitability Guide | Metasploit Documentation
Penetration testing framework for finding and exploiting vulnerabilities
OverTheWire Wargames
War games for learning security concepts through command-line challenges and puzzles
Pentesterlab
Master advanced penetration testing and deep security code review through real-world CVEs, detailed vulnerability analysis, and expert-led code reviews. Ideal for professionals seeking expert-level understanding beyond basic exploits.
PentesterLab: Learn Web Penetration Testing: The Right Way
Master advanced penetration testing and deep security code review through real-world CVEs, detailed vulnerability analysis, and expert-led code reviews. Ideal for professionals seeking expert-level understanding beyond basic exploits.
Portswigger
PortSwigger Labs | Web Security Academy
Mystery lab challenge Try solving a random lab with the title and description hidden. As you'll have no prior knowledge of the type of vulnerability that ...
Proving Grounds | Offensive Security
Hands-on cybersecurity training and practice environment
Root Me - Hacking and Information Security learning platform
Hands-on cybersecurity training and practice environment
Secure Code Warrior
Security learning resources and challenges for secure coding practices
Vulnerability Lab - SECURITY VULNERABILITY RESEARCH LABORATORY - Best Bug Bounty Programs, Vulnerability Coordination and Bug Bounty Platform
Hands-on cybersecurity training and practice environment
[Tutorial] Guide to Cracking using STORM or other Cracking Softwares (NOOB Friendly)
Educational resources and training materials for cybersecurity
/home/six2dez/.pentest-book | Pentest Book
Educational resources and training materials for cybersecurity
Academy
Structured cybersecurity learning platform with guided courses and certifications
Achievements - Heroes Cyber Security
Educational resources and training materials for cybersecurity
AI Python for Beginners - DeepLearning.AI
Educational resources and training materials for cybersecurity
AI Python for Beginners - DeepLearning.AI
Educational resources and training materials for cybersecurity
APIsec University - Become an API Security Expert
Educational resources and training materials for cybersecurity
Cryptohack
Interactive cryptography challenges and courses to learn modern cryptography
Cyber Security & Hacking Tutorials | The Cyber Mentor
Security research, tutorials, and technical articles
Cybrary
Free and paid cybersecurity training courses covering various security domains
Developer Roadmaps - roadmap.sh
Educational resources and training materials for cybersecurity
Ethical Hacker
Educational resources and training materials for cybersecurity
Forensic Exercises | CAS Cybersecurity
Educational resources and training materials for cybersecurity
Free Certifications - Find Free Professional Certifications Online
Educational resources and training materials for cybersecurity
kali - IHA089
Debian-based Linux distribution for penetration testing and security auditing
Kali Docs
Penetration testing and security auditing Linux distribution with pre-installed tools
Learn Git Branching
Educational resources and training materials for cybersecurity
MITRE ATT&CK®
Educational resources and training materials for cybersecurity
Offensive Security
Offensive Security training courses including OSCP, OSWE, and advanced penetration testing certifications
OffSec | Explore
Educational resources and training materials for cybersecurity
Overthewire
War games for learning security concepts through command-line challenges and puzzles
Pwn
Education platform for learning cybersecurity exploitation through hands-on practice
PyTorch - Zero to Mastery Learn PyTorch for Deep Learning
Educational resources and training materials for cybersecurity
Start | CAS Cybersecurity
Educational resources and training materials for cybersecurity
Tutorial for simple "bulletproof" setup
Educational resources and training materials for cybersecurity
Virts
Educational resources and training materials for cybersecurity
Windows Local Privilege Escalation - HackTricks
Educational resources and training materials for cybersecurity
OverTheWire: Wargames
War games for learning security concepts through command-line challenges and puzzles
UTW – Under the Wire… PowerShell Training for the People
Cybersecurity tool and resource
abuse.ch | Fighting malware and botnets
abuse.ch | Fighting malware and botnets
Any
Interactive malware analysis sandbox for threat intelligence and incident response
Any Run - Interactive Online Malware Analysis Sandbox
Automated malware analysis and threat intelligence
Any.Run
Interactive malware analysis sandbox for threat intelligence and incident response
CAPE Sandbox
Malware sandbox for executing and analyzing malicious files
Cuckoo Sandbox
Automated malware analysis and detection in isolated environment
Forensic Magnifier - free online photo forensics tools - 29a.ch
Forensically is a set of free tools for digital image forensics. It includes clone detection, error level analysis, meta data extraction and more.
Ghidra
Comprehensive reverse engineering suite developed by NSA
Hybrid Analysis
Free malware analysis service with detailed threat intelligence
Hybrid Analysis
Submit malware for free analysis with Falcon Sandbox and Hybrid Analysis technology. Hybrid Analysis develops and licenses analysis tools to fight malware.
Hybrid Analysis - Free Automated Malware Analysis Service
Free malware analysis service with detailed threat intelligence
IDA Pro
Multi-platform disassembler and debugger for Windows, Linux, and macOS
opabravo's list / Forensics & Reverse Engineering
Open source code repository and collaboration platform
Radare2
Portable and versatile reverse engineering framework
REMnux: A Linux Toolkit for Malware Analysts
Malware analysis and threat intelligence platform
Sandboxie-Plus
Sandbox isolation software for running untrusted applications
Virustotal
Analyze suspicious files and URLs to detect malware and threats
VirusTotal
Analyze suspicious files and URLs to detect malware and threats
VirusTotal
Analyze suspicious files and URLs to detect malware and threats
YARA
[TUT] Scan networks and perform DoS Attack
Network security and analysis tool
\(Cheat Sheet - Common Ports\) - common-ports.pdf
Network security and analysis tool
Chapter 14. iptables firewall
Network security and analysis tool
Check ALL open ports, scan open ports online free tool
Free online tools for scan open ports without limit of ports count
Common Ports
Network security and analysis tool
List of HTTP status codes - Wikipedia
Network security and analysis tool
Subnet Calculator - NetworkCalc
Use this online subnet calculator to quickly calculate the network details for an IP address or CIDR range. We also have a REST API for use in your projects!
Top 1,000 TCP and UDP ports (nmap default)
Update: 28 Jan 2025 Welcome Hack The Box crowd! Thank you for all the traffic, and be sure to check out https://nullsec.us/history-of-nmap-top-ports/ Some quick notes on what nmap scans by default, the commands below will give you the ranges scanned, and there's also some lists suitable for
Athena OS | Athena OS
Get started learning and hacking with Athena OS.
Athena OS Website
Get started learning and hacking with Athena OS.
BlackArch Linux
BlackArch Linux is a lightweight expansion to Arch Linux for penetration testers.
Kali
Penetration testing and security auditing Linux distribution with pre-installed tools
Kali Linux
Penetration testing and security auditing Linux distribution with pre-installed tools
Parrot OS
Security-focused operating system for penetration testing, forensics, and privacy
Parrotsec
Security-focused operating system for penetration testing, forensics, and privacy
Project Source
Open source code repository and collaboration platform
Qubes OS
Security-oriented operating system using compartmentalization
Tails
WSL - Microsoft Apps
Dive into a new Pentesting Experience! Athena OS is an Arch-derived Linux distribution designed for penetration testing, bug-bounty hunting and InfoSec students. The distribution provides a way to connect directly to some of the e-learning hacking resources, such as Hack The Box, Offensive Security, PWNX and InfoSec certifications, and it provides integration with the Hack The Box hacking platform and connections to InfoSec communities. Athena OS also introduces InfoSec roles (e.g. Cracker Specialist, Red Teamer, Web Pentester or OSINT Specialist) based on user preferences, so the user's system is populated with relevant tools only. Use Win-KeX to immerse in the Athena OS Desktop experience! Retrieve your Hack The Box App Token from Hack The Box website in your user profile. Run "htb-toolkit -k reset" to set your Hack The Box App Token and start to hack! Note: Athena OS for Microsoft Store requires Windows Subsystem for Linux (WSL) to function. Please ensure WSL is installed and enabled before running Athena OS. Learn, practice and enjoy with any hacking tool!
AsINT_Collection - start.me
Open source intelligence gathering and reconnaissance tool
Bellingcat OpenStreetMap Search | Bellingcat's Online Investigation Toolkit
Open source intelligence gathering and reconnaissance tool
Best remote OSINT employees for hire in Kenya in Sep 2025 | Himalayas
Open source intelligence gathering and reconnaissance tool
Censys - Certificates
Internet-wide scanning and analysis platform for security research
Censys - Hosts
Internet-wide scanning and analysis platform for security research
Central Ops - Free online network tools - traceroute, nslookup, dig, whois lookup, ping - IPv6
Domain registration and DNS information lookup service
CheckUser
CheckUser allows you to check username and domain availability across 70+ popular social network sites.
Cisco Talos Intelligence Group - Comprehensive Threat Intelligence
Open source intelligence gathering and reconnaissance tool
cloudcommunity/AI-Tools: A curated list of artificial intelligence (AI) tools.
Open source code repository and collaboration platform
commandergirl's suggestions - start.me
Open source intelligence gathering and reconnaissance tool
crt.sh - Certificate Search
Open source intelligence gathering and reconnaissance tool
Cybdetective
dark.fail: Which darknet sites are online?
Open source intelligence gathering and reconnaissance tool
darkfeed.io - DeepWeb intelligence Feed
Open source intelligence gathering and reconnaissance tool
DataSurgeon
Extract various sensitive information including emails, phone numbers, hashes, credit cards, URLs
de🔸digger find public files in Google Drive
Open source intelligence gathering and reconnaissance tool
domain.glass - Domain DNS Record and WHOIS Information
Domain registration and DNS information lookup service
Epieos
Face Comparison
Upload two photos to compare face similarity online in real time, and the AI model is free to detect, recognition accuracy rate exceeds 99%.
FaceCheckID
Reverse image lookup specialized in facial recognition
Github
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface. - smicallef/spiderfoot
GitHub - fastfire/deepdarkCTI: Collection of Cyber Threat Intelligence sources from the deep and dark web
Open source code repository and collaboration platform
Google Lens
h4t3p1ckl3s/FBI-tools: 🕵️ OSINT Tools for gathering information and actions forensics 🕵️
Open source code repository and collaboration platform
Holehe
Discover accounts linked to email addresses across various platforms
Home | Bellingcat's Online Investigation Toolkit
Open source intelligence gathering and reconnaissance tool
Hunter (Email Hunter) - Find email addresses in seconds
Open source intelligence gathering and reconnaissance tool
ICANN Lookup
Open source intelligence gathering and reconnaissance tool
Intelligence X
Search engine and data archive for OSINT investigations
Inteltechniques
IntelTechniques
Search engine tailored for OSINT investigations across multiple data types
Introduction to OSINT - My OSINT Training (MOT)
Open source intelligence gathering and reconnaissance tool
LeakCheck
Search over 7.5B breached entries for emails, usernames, and other data
LensoAI
LinaYorda/OSINTko: OSINTk.o is a customized Kali Linux-based ISO image with pre-installed packages and scripts
Open source code repository and collaboration platform
Maigret
Collect detailed information on individuals using their username
Maltego
Interactive data mining tool for link analysis and intelligence gathering
Mitaka
MX Lookup Tool - Check your DNS MX Records online - MxToolbox
Open source intelligence gathering and reconnaissance tool
My OSINT Training's Tools
Open source intelligence gathering and reconnaissance tool
Nixintel Open Source Intelligence & Investigations Geolocation: At The Retail Park
Open source intelligence gathering and reconnaissance tool
NS.tools: Check DNS domain or IP, test DNS lookup
Open source intelligence gathering and reconnaissance tool
Onion Search Engine
Open source intelligence gathering and reconnaissance tool
ONYPHE - Cyber Defense Search Engine
Open source intelligence gathering and reconnaissance tool
Open Source Surveillance
Open source intelligence gathering and reconnaissance tool
Osint
OSINT Analysis – Sofia Santos | OSINT Analysis & Exercises
Open source intelligence gathering and reconnaissance tool
OSINT Framework
Collection of OSINT tools and resources organized by category
osint.rocks
Osintframework
OsintLabs
Pim Eyes
PimEyes is an advanced face recognition search engine, a reverse image search tool, and a photo search mechanism used to find which websites publish your photos online.
Pulsedive - Threat Intelligence
Open source intelligence gathering and reconnaissance tool
Ransomware Group Sites
Open source intelligence gathering and reconnaissance tool
Sherlock
Shodan
Search engine for Internet-connected devices and servers
Social Catfish
The OSINT Rack
theHarvester
TinEye Reverse Image Search
Open source intelligence gathering and reconnaissance tool
Torch : The Tor Search Engine
Open source intelligence gathering and reconnaissance tool
UserSearch
Search by username or email on 600+ social networks & dating sites like Instagram, Tinder, Snapchat, Match & Facebook. Instant results, with no signup.
Whatsmyname
WhatsMyName
Whois.com - Domain Names & Identity for Everyone
Domain registration and DNS information lookup service
Yandex Images: search for images online or search by image
Open source intelligence gathering and reconnaissance tool
ZoomEye - Cyberspace surveying and mapping, network security, vulnerability analysis, dynamic surveying and mapping, Zhong Kui's eye, spatiotemporal surveying and mapping, cyberspace surveying and Mapping - zoomeye ('Zhong Kui's eye') cyberspace search engine
Open source intelligence gathering and reconnaissance tool
ZorexEye - The Hacker's Search Engine
Open source intelligence gathering and reconnaissance tool
Amass
In-depth attack surface mapping and asset discovery tool
Burp Suite
Powerful integrated platform for web application security testing
Ettercap
Comprehensive suite for man-in-the-middle attacks on LANs
Ffuf
Fast web fuzzer for discovering hidden files, directories, and resources
Github
Gobuster
Fast web fuzzing tool for discovering hidden directories and files
Gobuster
Masscan
TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes. - robertdavidgraham/masscan
Netcat
Networking utility for reading and writing data across networks
Nikto
Web server scanner for vulnerabilities and misconfigurations
Nmap
Network scanning utility for security auditing and network discovery
Nuclei
Fast and customizable vulnerability scanner based on templates
OWASP ZAP
Integrated penetration testing tool for identifying vulnerabilities in web applications
Responder
Tool for poisoning network traffic and conducting MITM attacks
RustScan
🤖 The Modern Port Scanner 🤖. Contribute to bee-san/RustScan development by creating an account on GitHub.
SQLMap
Automatic SQL injection and database takeover tool - sqlmapproject/sqlmap
Subfinder
Subdomain discovery tool that returns valid subdomains for websites
Wireshark
Network protocol analyzer for troubleshooting, analysis, and security investigations
WPScan
WPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websites. Contact us via contact@wpscan.com - wpscanteam/wpscan
10. Scanning a System — Greenbone Security Manager (GSM) 6 documentation
Security testing and penetration testing toolkit
4qrcode - QR Code image reader
Free online QR Code scanner from images with webcam or from photo (QR scanner, QR Code reader from image online, QR Code scanner online, how to scan a qr code)
A Great Vim Cheat Sheet
A Great Vim Cheat Sheet
AttackerKB
Not all vulns are created equal.
AutoRegex: Convert from English to RegEx with Natural Language Processing
Security testing and penetration testing toolkit
Best hacking books for aspiring hackers - Real life hacking scenarios
My best hacking books of the "hack the planet" series, feature real life hacking scenarios and custom built tools to hack any company...
Burpsuite
Web application security testing toolkit with scanner, proxy, and exploitation tools
CCN Gate 1
Security testing and penetration testing toolkit
Code Search | Grep by Vercel
Effortlessly search for code, files, and paths across a million GitHub repositories.
CoinBlockerLists - Search
If you know something, share it. If you learn something, learn more. When you really know your stuff, teach it!
CyberChef
Web app for encryption, encoding, compression and data analysis - the Cyber Swiss Army Knife
Darknet Markets Tips
Security testing and penetration testing toolkit
Diff Checker - Compare the difference between images
Compare images (jpg, png, webp, gif, heic, etc.) to find differences with Diffchecker online for free! Use our desktop app for offline, private diffs.
Docker Hub Images
Security testing and penetration testing toolkit
File Inclusion/Path traversal - HackTricks
This URL is invalid, sorry. Please use the navigation bar or search to continue.
Get-CIMInstance - PowerShell - SS64.com
Security testing and penetration testing toolkit
Github
Comprehensive guide to testing web application security - OWASP Web Security Testing Guide
Google Hacking DB
The GHDB is an index of search queries (we call them dorks) used to find publicly available information, intended for pentesters and security researchers.
GrayhatWarfare - Public Buckets
Security testing and penetration testing toolkit
GreyNoise Visualizer
At GreyNoise, we collect and analyze untargeted, widespread, and opportunistic scan and attack activity that reaches every server directly connected to the Internet.
GTFOBins
Security testing and penetration testing toolkit
Hacking Multifactor Authentication | Wiley
<p><b>Protect your organization from scandalously easy-to-hack MFA security “solutions”</b> </p> <p>Multi-Factor Authentication (MFA) is spreading like wildfire across digital environments. However, hundreds of millions of dollars have been stolen from MFA-protected online accounts. How? Most people who use multifactor authentication (MFA) have been told that it is far less hackable than other types of authentication, or even that it is unhackable. You might be shocked to learn that all MFA solutions are actually <i>easy</i> to hack. That’s right: there is no perfectly safe MFA solution. In fact, most can be hacked at least five different ways. <i>Hacking Multifactor Authentication</i> will show you how MFA works behind the scenes and how poorly linked multi-step authentication steps allows MFA to be hacked and compromised. </p> <p>This book covers over two dozen ways that various MFA solutions can be hacked, including the methods (and defenses) common to all MFA solutions. You’ll learn about the various types of MFA solutions, their strengthens and weaknesses, and how to pick the best, most defensible MFA solution for your (or your customers') needs. Finally, this book reveals a simple method for quickly evaluating your existing MFA solutions. If using or developing a secure MFA solution is important to you, you need this book. </p> <ul> <li>Learn how different types of multifactor authentication work behind the scenes</li> <li>See how easy it is to hack MFA security solutions—no matter how secure they seem</li> <li>Identify the strengths and weaknesses in your (or your customers’) existing MFA security and how to mitigate</li> </ul> Author Roger Grimes is an internationally known security expert whose work on hacking MFA has generated significant buzz in the security world. Read this book to learn what decisions and preparations your organization needs to take to prevent losses from MFA hacking.
Have I Been Emotet
Search your email address on Emotet malspam database
Helpful free tools and resources.
Security testing and penetration testing toolkit
HTTP Ping | Networking Toolbox
Measure HTTP/HTTPS response latency with statistical analysis (median, p95) without raw ICMP
i2OCR - Free Online OCR
i2OCR is a free online tool utilizing advanced artificial intelligence for optical character recognition (OCR). This tool enables the extraction of text from images, allowing users to subsequently edit, format, index, search, or translate the extracted content. i2OCR offers versatility in saving recognized text across various formats including plain text, Word documents, HTML, and PDF. Notably, it supports over 100 languages for recognition, facilitates multi-column document analysis, permits unlimited usage without requiring registration, and is entirely free of charge.
Insecam - World biggest online cameras directory
Insecam.com - the world biggest directory of online cameras. Watch live street, traffic, parking, office, road, beach, earth online webcams. .
Interact.sh | Web Client
Security testing and penetration testing toolkit
JS NICE: Statistical renaming, Type inference and Deobfuscation
JS NICE | Software Reliability Lab in ETH
jwt.io - JSON Web Tokens
JSON Web Token (JWT) is a compact URL-safe means of representing claims to be transferred between two parties. The claims in a JWT are encoded as a JSON object that is digitally signed using JSON Web Signature (JWS).
Kali NetHunter
Penetration testing and security auditing Linux distribution with pre-installed tools
Kali Tools
Penetration testing and security auditing Linux distribution with pre-installed tools
KE1.be / CC Checker 4
Security testing and penetration testing toolkit
KMimeMagic
Security testing and penetration testing toolkit
List of file signatures - Wikipedia
Security testing and penetration testing toolkit
LOLBAS
Security testing and penetration testing toolkit
Maltiverse
Security testing and penetration testing toolkit
mandiant/flare-vm: A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.
Open source code repository and collaboration platform
Metasploit
Penetration testing framework for discovering, exploiting, and validating vulnerabilities
Metasploit anonymous question
Penetration testing framework for finding and exploiting vulnerabilities
NerdyData.com - Search The Web's Source Code for Technologies - NerdyData
Security testing and penetration testing toolkit
Nessus Report Downloader script
Security testing and penetration testing toolkit
netograph.io ~ mapping the deep structure of the web.
Netograph captures detailed, low-level snapshots of the web.
Nmap
NMAP - Default NSE Category
Network scanning utility for security auditing and network discovery
pingb.in
Security testing and penetration testing toolkit
Pipl - Identity Information for Investigation and Research
Pipl is a provider of identity solutions. We aim to provide the best identity information to organizations in order to ensure that trustworthy people can be trusted.
Plugins (Nessus)
Security testing and penetration testing toolkit
Plugins | Tenable®
Tenable Research has published 288091 plugins, covering 110748 CVE IDs and 30933 Bugtraq IDs.
PyTorch - Documentation
PyTorch is an optimized tensor library for deep learning using GPUs and CPUs.
Radio Frequency National Site Archive
Security testing and penetration testing toolkit
Rapid7 Open Data
Offering researchers and partners access to data from Project Sonar, which conducts internet-wide surveys to gain insights into global exposure to common vulnerabilities.
Scamalytics
Scamalytics IP address fraud risk lookup. Check IP addresses on our website or use our API. Check for proxies and fraud profile.
Scan and Policy Templates (Nessus)
Security testing and penetration testing toolkit
Scanning a System — Greenbone Security Manager (GSM) 6 documentation
Security testing and penetration testing toolkit
Secure-Cookie
Intentionally vulnerable web apps to learn and improve your web security skills.
SQL Injection Cheat Sheet | pentestmonkey
Security testing and penetration testing toolkit
Stegsolve - aldeid
Security testing and penetration testing toolkit
Telegram: Contact @hacker_resources
Security testing and penetration testing toolkit
The Top 60 Rat Open Source Projects
Open source projects categorized as Rat
Tmux Cheat Sheet & Quick Reference
Master tmux with the comprehensive cheat sheet: session management, examples, installation guide and more for the ultimate terminal multiplexer.
Unswirl Image | CAS Cybersecurity
Imagine you get an Image like this which contains a text. But the image is digitaly distored and you should find a way to made it readable. I’ve tried to solve a particular challenge of a CTF Game and the final flag was masked like this 😎
ViewDNS.info - Your one source for DNS related tools!
Find all sites hosted on a given server.
Vigilante.pw ‐ The Breached Database Directory
Have you been compromised? DeHashed provides free deep-web scans and protection against credential leaks. A modern personal asset search engine created for security analysts, journalists, security companies, and everyday people to help secure accounts and provide insight on compromised assets. Free breach alerts & breach notifications.
villager · PyPI
This was an experimental technology project
Wappalyzer - Find out what websites are built with
Find out the technology stack of any website. Create lists of websites and contacts by the technologies they use.
WiGLE: Wireless Network Mapping
Maps and database of 802.11 wireless networks, with statistics, submitted by wardrivers, netstumblers, and net huggers.
Wireshark
Network protocol analyzer for troubleshooting, analysis, and security investigations
xResolver • Dashboard
Welcome to xResolver - Your #1 Gamertag Resolver for Xbox & PlayStation along with many other tools.
XSS Hunter
Security testing and penetration testing toolkit
Common Vulnerability Scoring System SIG
Vulnerability database and security advisories
Common Vulnerability Scoring System Version 3.1 Calculator
Vulnerability database and security advisories
CWE - Common Weakness Enumeration
Common Weakness Enumeration (CWE) is a list of software and hardware weaknesses.
Exploit Database - Exploits for Penetration Testers, Researchers, and Ethical Hackers
The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.
Exploit-DB
The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.
Exploiting the xmlrpc.php on all WordPress versions
Vulnerability database and security advisories
Rapid7 - Vulnerability & Exploit Database
Rapid7's Exploit DB is a repository of vetted computer software exploits and exploitable vulnerabilities. Search over 140k vulnerabilities.
Vulnerability Database 🛡
Number one vulnerability management and threat intelligence platform documenting and explaining vulnerabilities since 1970.
Interactive PHP webshell - GitHub
Open source code repository and collaboration platform
PentestMonkey - PHP Reverse Shell
Open source code repository and collaboration platform
PentestMonkey - Reverse Shell Cheat Sheet
Web shell collection for penetration testing
Reverse Shell Cheat Sheet
Security research, tutorials, and technical articles
Reverse Shell Online Generator
Online Reverse Shell generator with Local Storage functionality, URI & Base64 Encoding, MSFVenom Generator, and Raw Mode. Great for CTFs.
Simple-Backdoor-One-Liner.php · GitHub
Open source code repository and collaboration platform
https://raw.githubusercontent.com/DragonJAR/Security-Wordlist/main/LFI-WordList-Linux
Password and word lists for security testing
https://raw.githubusercontent.com/DragonJAR/Security-Wordlist/main/LFI-WordList-Windows
Password and word lists for security testing
PayloadsAllTheThings/Reverse Shell Cheatsheet.md at master · swisskyrepo/PayloadsAllTheThings · GitHub
Open source code repository and collaboration platform
SecLists
Collection of multiple types of lists used during security assessments, including usernames, passwords, and fuzzing payloads
HackerSploit
IppSec
IppSec - YouTube
Video Search: https://ippsec.rocks
John Hammond
Cybersecurity content including CTF solutions, malware analysis, and programming tutorials
LiveOverflow
just a wannabe hacker... making videos about various IT security topics and participating in hacking competitions. -=[ ❤️ Support me ]=- Patreon per Video: https://www.patreon.com/join/liveoverflow YouTube Membership per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ 📄 Imprint ]=- Security Flag GmbH Mühlenstraße 8a 14167 Berlin Germany
LiveOverflow - YouTube
just a wannabe hacker... making videos about various IT security topics and participating in hacking competitions. -=[ ❤️ Support me ]=- Patreon per Video: https://www.patreon.com/join/liveoverflow YouTube Membership per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ 📄 Imprint ]=- Security Flag GmbH Mühlenstraße 8a 14167 Berlin Germany
NetworkChuck
IT and cybersecurity training videos covering networking, hacking, and certifications
S4vitar
STÖK - YouTube
HACKERS GONNA HACK CREATORS GONNA CREATE Support my work: Join me on Patreon! https://www.patreon.com/stokfredrik stokfredrik.com twitter.com/stokfredrik instagram.com/stokfredrik
The Cyber Mentor
VbScrub - YouTube
IT security and software development tutorials, and the occasional Hack The Box machine
Youtube
IT and cybersecurity training videos covering networking, hacking, and certifications
Youtube
Youtube
Cybersecurity content including CTF solutions, malware analysis, and programming tutorials
No results found
Try adjusting your search or filter